Static task
static1
Behavioral task
behavioral1
Sample
eb435b2db34eff91dcd08dd067ed7ea85c23558e6a246001b237a85248a8b17d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
eb435b2db34eff91dcd08dd067ed7ea85c23558e6a246001b237a85248a8b17d.exe
Resource
win10v2004-20231023-en
General
-
Target
086d7c5152d88e0dcd1433c3f6d52b52.bin
-
Size
147KB
-
MD5
c552dc0c62f5168354b750a48d1a49c9
-
SHA1
77402449c435fd5697ce21a30a3b823d51ee45f0
-
SHA256
773b9cac5839182052210d56b8f477774c182875b5418d60fc5d4aa9d753bc73
-
SHA512
4f5e9ae3bd94bf3286795fadb0d9cba4173bbabb773329292a73d74530b40fa629aea082f9fa37db75855ef2ac9b9a521723721fc2bb89092d48ac68a0a86683
-
SSDEEP
3072:ToPCaTHxYGkqI0J8nzGAJktOiuP3GpqEH7kOwmpPXemfvU+cA:ToPCaDx3kqI0inbCOiTLHYOwmcmfM+b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/eb435b2db34eff91dcd08dd067ed7ea85c23558e6a246001b237a85248a8b17d.exe
Files
-
086d7c5152d88e0dcd1433c3f6d52b52.bin.zip
Password: infected
-
eb435b2db34eff91dcd08dd067ed7ea85c23558e6a246001b237a85248a8b17d.exe.exe windows:5 windows x64
Password: infected
037703076fb96d748fcda032a3cdf0fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ConvertThreadToFiber
FindClose
FindNextFileA
FindFirstFileA
SwitchToFiber
CreateFiber
VirtualProtect
GetTimeZoneInformation
CloseHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
GetStringTypeW
LCMapStringW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlLookupFunctionEntry
RtlUnwindEx
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
GetModuleFileNameW
RaiseException
RtlPcToFileHeader
GetCommandLineA
FlsGetValue
FlsSetValue
GetCurrentThreadId
FlsAlloc
FlsFree
SetLastError
GetLastError
GetCurrentThread
HeapSize
HeapValidate
IsBadReadPtr
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
FatalAppExitA
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetModuleHandleW
ExitProcess
SetConsoleCtrlHandler
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapAlloc
HeapReAlloc
HeapQueryInformation
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
CreateFileW
winhttp
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCloseHandle
Sections
.text Size: 426KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ